mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-05 17:01:00 +01:00
![]() Support profiles that choose to match the presence of an extended attribute without validating its value. This lets AppArmor target xattrs with binary data, such as security.ima and security.evm values. For example, it's now possible to write a profile such as: profile signed_binaries /** xattrs=(security.ima) { # ... } Both presence and value matches can be used in the same profile. To match a signed xattr, target both the xattr and the security.ima value: profile python_script /** xattrs=( security.evm security.apparmor="python" ) { # ... } Updated to work using out of band matching instead of separate data array. Signed-off-by: Eric Chiang <ericchiang@google.com> Signed-off-by: John Johansen <john.johansen@canonical.com> |
||
---|---|---|
.. | ||
abi | ||
bare_include_tests | ||
capability | ||
change_hat | ||
change_profile | ||
conditional | ||
dbus | ||
file | ||
include_tests | ||
includes | ||
includes-preamble | ||
mount | ||
network | ||
profile | ||
ptrace | ||
rewrite | ||
rlimits | ||
signal | ||
unix | ||
vars | ||
xattrs | ||
xtrans | ||
readme |
Directory for auto generated x-transition tests